> From: owner-openssl-us...@openssl.org On Behalf Of Dave Thompson
> Sent: Saturday, 03 December, 2011 20:44

> > 2.  Is there any way to decrypt Application data (HTTP 
> > data) on  wireshark itself ?
> 
> If using kRSA and you have/get the server's private key, yes.
> Edit / Preferences / Protocols / SSL and supply the keyfile.
> 
> If using ephemeral or anonymous DH or ECDH, it is not generally 
> possible to reconstruct keys from stored and transmitted data, 
> called Perfect Forward Secrecy, although if either end uses 
> OpenSSL with _tmp_[ec]dh_ keys that are known or logged, you could; 
> it appears wireshark doesn't. 

On rereading, I realize this is wrong. _tmp_[ec]dh_ only 
sets the _parameters_; the actual key (X,Y) is nonce.
You'd have to extract it from the SSL* and save it explicitly, 
and then have code to use it (which wireshark doesn't seem to).

> Similarly for temporary (export) 
> RSA, if the server uses _tmp_rsa_ that is known or logged;
> I don't know if wireshark does that and didn't bother testing 
> because RSA-export is stupid and obsolete.
> 
On the other hand, I left out: if either end caches the 
SSL session in an accessible form (which OpenSSL can) 
that includes the master, which with the (visible) handshake 
is enough to derive the working keys, and decrypt the data.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to